Preferred Language
Articles
/
jcopolicy-606
The Role of Association of Southeast Asian Nations (Asean) in Achieving Regional Security
...Show More Authors

The organizational structure of relations between states is among the main features that distinguished the twentieth century as the era of international organization, especially after the increase in the number of political units after World War II in which regionalism was crystallized as a phenomenon. It is not modern, as there are many blocs such as the European Union that have developed in it, the idea of ​​regional bloc is prominent, especially in Europe, as it emerged after a controversy revolved around what was called globalism in the face of Globalism vs. Regionalism. Regional, as the proponents of the global orientation saw the establishment of a global organization that includes all countries, as the best way to achieve international peace and security, while the proponents of the regional orientation emphasized the importance of establishing regional organizations to achieve this, and from here the theory of “regional peace” arose after the World War the second. Since the capabilities of developing countries to compete are weak, many of these countries have sought to take one form or another of regional cooperation in order to enhance their economic capacity in facing these challenges. In this context, the experience of the Association of Southeast Asian Nations, known as ASEAN for short, represents a distinct model in this regard, which prompted it to be considered a model capable of being emulated by developing countries in their quest to maximize their gains in light of the contemporary international reality. Hence the importance of this research paper, which seeks to identify the factors of success or failure of the “ASEAN” experience in achieving regional security, its weaknesses, the challenges and difficulties it faces, and how to deal with them, in order to identify the extent of the possibilities of benefiting from this experience within the Arab region.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Emergency Fuel Rationing system using RFID Smart Cards
...Show More Authors

Rationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (29)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
مدى ملائمة خصائص العمل البيئية لتخطيط وتصميم مساحات المصنع دراسة ميدانية في الشركة العامة للصناعات الإنشائية (مصنع الأنابيب البلاستيكية) والجلدية (مصنع الدباغة) في الزعفرانية
...Show More Authors

 The Problem of the research  is Limited with the ambguity of environmental work Characterstics role and among them the natural Working Conditions: Temproture, Lighting, Noise, Colours,and Smells, in the Decisions that rule the Planning and Designing work of the industrial Location and it 's targets are Limited with discovering the effect of environmental work Characterstics in planning and designing the industrial Companies and to reach to the most important properties that distinguish the industrial Location Within the frame of dealing with the nature Conditions in the dry, hot regions and the dfining of the relationship between them on the assumption that the Characterstics of environmental work have agreat effect in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 17 2025
Journal Name
سفير برس
استثمار الذكاء الاصطناعي في تحليل البيانات الضخمة داخل المؤسسات العلمية
...Show More Authors

تناول المقال موضوع استثمار الذكاء الاصطناعي في تحليل البيانات الضخمة داخل المؤسسات العلمية، وركز على توضيح أهمية هذا التكامل في تعزيز الأداء الأكاديمي والبحثي. استعرضت المقالة تعريفات كل من الذكاء الاصطناعي والبيانات الضخمة، وأنواع البيانات داخل المؤسسات العلمية، ثم بينت أبرز التطبيقات العملية مثل التنبؤ بأداء الطلبة، والإرشاد الذكي، وتحليل سلوك المستخدمين، والفهرسة التلقائية. كما ناقشت المقالة التحدي

... Show More
Publication Date
Sat Jul 15 2023
Journal Name
Arid International Journal Of Media Studies And Communication Sciences
صناعة المحتوى في المواقع الالكترونية وانعكاسه على مستوى ثقة الجمهور
...Show More Authors

تشهد الساحة الاعلامية في وقتنا الحاضر تطورات سريعة وبشكل متزايد سواء في طريقة صناعة الرسالة الاعلامية او اسلوب تقديمها وعرضها ،وفي ظل تعدد وتنوع وسائل الاعلام الجديد والزخم الاعلامي الذي يتعرض له المستخدم فيجد نفسه وسط كم هائل من الاخبار متعددة المصادر والاشكال ، فكيف له ان يميز بين المعلومة الصادقة والزائفة ؟ ومادرجة ثقته بتلك المعلومات والمواقع الالكترونية ؟ ويهدف البحث الى الكشف عن مدى توفر عناصر صناعة

... Show More
View Publication
Publication Date
Sat Jun 01 2024
Journal Name
دراسات دولية
توظيف خيارات استراتيجيات مكافحة التطرف العنيف في العراق وافاقها المستقبلية
...Show More Authors

أن للتطرف العنيف أسباب متنوعة تقف وراء ظهوره وتمدده في دول العالم المختلفة على نطاق واسع، إذ إن لكل بيئة ظروفها وخصوصياتها الكلية والفرعية التي تسهم في تعزيز القدرة التأثيرية للسلوكيات العنفية في إطار مجتمع ما، لاسيما إذا علمنا إن التطرف العنيف المؤدي الى الإرهاب كسلوكيات عنفية متطرفة مدمرة للبناء المجتمعي ما كان ليستمر لولا وجود بيئة حاضنة وظروف تساعد في انتشاره واستمرارية قدراته التأثيرية في البناء السي

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
مجلة كلية التربية للبنات/ مجلة علمية ثقافية تربوية محكمة
الاتجاهات الموضوعية للبحوث المنشورة في مجلة كلية القانون / جامعة بغداد
...Show More Authors

Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
إنشاء جائزة عربية للجودة في قطاع التعليم العالي: رؤيــة عراقيــة
...Show More Authors

  IF we called twentieth century, the century of productivity and information revolution, the suitable address for twenty-first century is (( The quality century )) .

The research aims to initiate Arabic prize for quality to apply concepts and strategies of total quality management at Higher education sector, which is a vital sector and it may be the most importance sector because it provide efficient human manpower working at all other sectors.

The suggested prize take in consideration the specialty of this sector, and when we apply perspectives of this prize this will promote Arabic universities performance as well as the quality of graduates.

The importance of this research due to the necessity of this pri

... Show More
View Publication Preview PDF